Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp6812340rwd; Mon, 19 Jun 2023 12:50:11 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ4RYw0v+9/bF5UUdrPBLtjGMsDiOwosSH6rLWSH6/6i3Re79LZtRDuxUspgbrmLTxYy2cTE X-Received: by 2002:a05:6a20:6a25:b0:10b:fe06:97dd with SMTP id p37-20020a056a206a2500b0010bfe0697ddmr14777899pzk.54.1687204210936; Mon, 19 Jun 2023 12:50:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1687204210; cv=none; d=google.com; s=arc-20160816; b=zMODuAiPm1HQ6yKHbQAuFg+2AEOhlF0gvpCGwiu3Kh4+6IzjKSl/63YIal+dedXLJM +JfpYH60Kct7Yo+VeT7xd6/V59E5DRAHcqsQ2yEEAfwIIfExCwr9icx3OWJ9W7bTpCrk yssLQdsEaY3TqOODrhQouOTj8I54pgxoYVOyPGjL9uy+6uDgnhVpaL2KgtTEsaQX7pws ptYW4v++qoVTYRolO0wGDWeJ/MUnfFNspy4b8oyPn8Z9IzoRn5+vf8Tn6egUBsud+gdc IJaNq2l9os+EY5wzRIp26u920n/rexJV08MoUAIyfxvlV+xAFeGMF4XHRJDT2Fy/G5Hh HWAg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=SVYc5tgS9GuhHSW4I9Rx24JeDuyY6zS9msd6s7vhYTU=; b=Er252a74bfpQ/OVeo6/F3unaYgz51HoKZm3yjnIOWhHsCcIXnawe3ac+GAYBo7FC80 KBtJKVvkya9744/kSW/V5P3OART2FP74NU6I2HGcfMEptxKBQ/wh839ZG+t3AUIM3Pw1 SGpvTG/jfR/wvQuYkhHPidw3M+VGNdAYMWS38efACse/ft0VXbMFZ+GSmN48tQjprd3v zoNtFxu6J0qylBiz2/H0cp9QFagNqP/zaE9Xq1RPMW+/2kWlH+oA2gmu83MYvGySVKCb uMaaKruU+3UjFNiv89ZM+BlfrrDYY6X1zLXsHoIsmoqqQOQryrQTihUyDgAqpCYWHZLF Q3Og== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b=OnleU7zr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id e3-20020a637443000000b0054294720d55si163508pgn.262.2023.06.19.12.49.56; Mon, 19 Jun 2023 12:50:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b=OnleU7zr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232318AbjFSTMF (ORCPT + 99 others); Mon, 19 Jun 2023 15:12:05 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38390 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229628AbjFSTMD (ORCPT ); Mon, 19 Jun 2023 15:12:03 -0400 Received: from mail-qv1-xf2e.google.com (mail-qv1-xf2e.google.com [IPv6:2607:f8b0:4864:20::f2e]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4AD44113 for ; Mon, 19 Jun 2023 12:12:02 -0700 (PDT) Received: by mail-qv1-xf2e.google.com with SMTP id 6a1803df08f44-62ff6cf5af0so35207366d6.0 for ; Mon, 19 Jun 2023 12:12:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20221208; t=1687201921; x=1689793921; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=SVYc5tgS9GuhHSW4I9Rx24JeDuyY6zS9msd6s7vhYTU=; b=OnleU7zrZ4EJ5IyP76ORdPEGUQJvFcLOukq8VMDe+wwB+FGyzxbTlaoLKzEjpLPfy3 MZbQ9QFq06vaie7OdQwrruTdOjItnQ+zYAclJz87yqkQDAaEWgbwvpwWsjBgCDRLZFAE jt71Nvx60sycS2/amx/VkoRkjk/371B0lt/rI0UHfiZj+hClNfMtNZzUUlWaXtOFUKZV RDmiPgZhS9rWVvjs1DAH67l47h9ov1Fyb86uBVIb+j7Rt7nQVrKAFnCx0564bcXdMxbW rKKd1rOoBykB8xwUV4i3zZk6qvg3rpBVKmjtEhwvFpKd3sS/I4ObEqPjguq3163nS9Ea 91JQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687201921; x=1689793921; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=SVYc5tgS9GuhHSW4I9Rx24JeDuyY6zS9msd6s7vhYTU=; b=LigHfHf7IF5rOye7lXLSKCcJQcG1iETfX1tLhKTW+7rd5CyQJuYkmyCEy/KUl6+Jgi wrQtbtr2s1utqjOacPB1QlcMx8i17aDwhRs9gqi04Vdgv/EnxUius6BxTh1Sa2dO6CFN VhUmGPg8ZeEP7FIW7cHiSengA0RuW8k1Eanz7xCVp6hmbjQ90rliMtNfNGaUHIrvC0Ee JlxhuvTjrmaMDnLkGPnX5u9B9AzcTrW6x0Glu8Z/0JrEvrEw7Ny/GDv9PLW+0HQ/foM3 HZsUkMB4DrHkztmbOQTvM8r0N5i2ThT+JSwbv9kUyBq3YOSkHpBNHNVk75GKKnjOcm4a kM4A== X-Gm-Message-State: AC+VfDylsU0pi+e1ncxGaQ9jniROZhHUWmoO2lUbPByn9njr3XO+T8vg e3hlCNRRVSj+M2YZreWo3rM3g2Vz8sj46MyTue2jag== X-Received: by 2002:a05:6214:e8a:b0:621:331b:f55d with SMTP id hf10-20020a0562140e8a00b00621331bf55dmr13680549qvb.19.1687201921127; Mon, 19 Jun 2023 12:12:01 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: Vishal Annapurve Date: Mon, 19 Jun 2023 12:11:50 -0700 Message-ID: Subject: Re: [RFC PATCH 0/6] KVM: guest memory: Misc enhacnement To: isaku.yamahata@intel.com Cc: kvm@vger.kernel.org, linux-kernel@vger.kernel.org, isaku.yamahata@gmail.com, Paolo Bonzini , erdemaktas@google.com, Sean Christopherson , Sagi Shahar , David Matlack , Kai Huang , Zhi Wang , chen.bo@intel.com, linux-coco@lists.linux.dev, Chao Peng , Ackerley Tng , Michael Roth Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jun 15, 2023 at 1:12=E2=80=AFPM wrote: > ... > > * VM type: Now we have KVM_X86_PROTECTED_VM. How do we proceed? > - Keep KVM_X86_PROTECTED_VM for its use. Introduce KVM_X86_TDX_VM > - Use KVM_X86_PROTECTED_VM for TDX. (If necessary, introduce another ty= pe in > the future) > - any other way? There are selftests posted[1] in context of this work, which rely on KVM_X86_PROTECTED_VM being just the software-only psuedo-confidential VMs. In future there might be more work to expand this usecase to full-scale VMs. So it would be better to treat protected VMs as a separate type which can be used on any platform without the need of enabling TDX/SEV functionality. TDX VM type can possibly serve as a specialized type of protected VM with additional arch specific capabilities enabled. [1] - https://github.com/sean-jc/linux/commits/x86/kvm_gmem_solo